“…Typical countermeasures rely on traffic measures to identify anomalies in the traffic profiles, such as for instance [43], [44], [45], [18], [46]. Solutions to safeguard the controller from the risk to be overloaded have also been proposed in the literature [47].…”